In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the product uses hard-coded credentials, which may allow an attacker to connect to a specific port.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-19378 | In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the product uses hard-coded credentials, which may allow an attacker to connect to a specific port. |
Fixes
Solution
No solution given by the vendor.
Workaround
Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.
References
History
Thu, 17 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-10-17T16:01:00.443Z
Reserved: 2024-01-05T21:39:05.426Z
Link: CVE-2024-21764

Updated: 2024-08-01T22:27:36.321Z

Status : Modified
Published: 2024-02-02T00:15:54.767
Modified: 2024-11-21T08:54:57.880
Link: CVE-2024-21764

No data.

No data.